The foundation of a landmark presidential executive order and now a standard embraced by governments and enterprises globally, zero trust has come far in the past two years. Zero trust creator John Kindervag offers a progress report and insight into the key trends he sees shaping the new year.
The U.S. Army has embarked on its zero trust journey for both its information and network operations. Army CIO Dr. Raj Iyer shares how the military and the private sector are partnering to secure cloud infrastructure and solidify threat intelligence capabilities to fight adversaries.
IT and security organizations can simplify the zero trust journey in the cloud by allowing internet traffic to go directly to the required destination instead of routing through the data center, says Sudip Banerjee, field CTO for Zscaler for the Asia-Pacific and Japan region.
How can companies take a data-centric approach to their zero trust strategy? Two experts - Scott Leach, vice president Asia Pacific at Varonis, and Maheswaran Shanmugasundaram, country manager for South Asia at Varonis - share why getting a handle on your data helps improve cybersecurity.
CISOs today are dealing with many kinds of attacks, and the volume of activity is overwhelming employees in the security operations center, potentially leaving the enterprise open to breaches, says Manish Sinha, director of sales engineering at Trellix.
In India, ransomware attacks, phishing, botnets and nation-state attacks - including attacks on supply chains and critical infrastructure - are all on the rise. Plus, there's a huge cybersecurity skills gap. Terence Gomes of Microsoft in India discusses how the company addresses these issues.
Complexity is the enemy of security, and information technology grows ever more complex. Have we created a problem space in computing so complicated that we will be unable to safely operate in it for its intended purposes? Fred Cohen says that's unlikely. He discusses managing risk in the future.
With massive digitization and cloud adoption, the attack surface has broadened and new threats have emerged. Challenges like ransomware, supply chain attacks and financial fraud continue to pose problems for security practitioners.
At Cisco, we believe the promise of a zero trust security strategy should be securing access in a way that frustrates attackers and not users. Zero trust is not a new concept. But today’s rise in adoption reflects a fast-changing reality - boundaries that once existed to secure access to corporate data no longer...
No vendor can sell you an out-of-the-box zero trust architecture, because zero trust (ZT) is more than just products or infrastructure. It’s a philosophy, a mindset, a strategy and a framework.
A zero trust approach means treating any network as compromised and assuming that threats — both external and internal...
In Part 3 of a three-part video series, CyberEdBoard member Andrew Abel, a cybersecurity and zero trust consultant, and Chase Cunningham, CSO at Ericom Software, describe the operational and business benefits of creating an identity strategy.
In Part 2 of this video series, CyberEdBoard member Andrew Abel, a cybersecurity and zero trust consultant, and Chase Cunningham, CSO at Ericom Software, explain why organizations need to think about identities in the context of humans and nonhumans, their roles and their risks.
In Part 1 of a three part-video series, Andrew Abel, a cybersecurity and zero trust consultant and CyberEdBoard member, and Chase Cunningham, CSO at Ericom Software, share tips on how to create an identity strategy within the broader context of zero trust.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.asia, you agree to our use of cookies.